A computer program outputs whether a capital city in Europe is north or south of another capital city in Europe. It only needs to know the latitude of the two cities – the other detail is unnecessary. This is an example of abstraction; including the necessary detail and not including the unnecessary detail.

A Computer Program Outputs Whether A Capital City In Europe Is North Or South Of Another Capital City

Answers

Answer 1
Program brief :

City = input(“Enter a city in Europe”)Latitude=input(“Enter the Latitude ofthe city”)

If Lattitude ==

Related Questions

You are a server virtualization consultant. During a planning meeting with a client, the issue of virtual machine point-in-time snapshots comes up. You recommend careful use of snapshots because of the security ramifications. Which security problem is the most likely to occur when using snapshots

Answers

When employing snapshots, the security issue that is most likely to arise will have less patch updates than invoked snapshots.

What kind of hypervisor would be necessary to use an existing server running an existing operating system?

Typically, a Type 2 hypervisor is set up on top of an existing OS. It is frequently referred to as a hosted hypervisor since it uses the pre-existing OS of the host system to control calls to CPU, memory, storage, and network resources.

What does server virtualization primarily provide users of cloud computing?

What are the advantages of server virtualization? It makes cloud computing more practical and effective. Any machine to which the user has access can access the virtual desktop.

To know more about invoked snapshots visit :-

https://brainly.com/question/5244511

#SPJ4

The "Traveling Salesperson Problem" poses this question: A salesperson is given a list of cities and the distances between them. The salesperson has to visit each city exactly once and then return to the first city. What is the shortest possible route the salesperson could take? Assume an actual salesperson is trying to determine the shortest route she can take to visit 18 cities. She could use a computer program to calculate the distance of every possible route and then select the shortest one. Alternatively, she could use a heuristic to find a route. Which of the following reasons would justify the use of a heuristic? Elimination Tool​

Answers

When using an algorithm to solve a problem is difficult or impractical, a heuristic is employed. We therefore need something that works well enough to find a route. A heuristic excels in this situation.

A heuristic function's definition.

A heuristic function is a function that estimates a problem's approximate cost (or ranks alternatives). Finding the shortest driving distance to a destination is an example of a problem. The distance in a straight line to the spot would be a heuristic cost. Informed Search employs the heuristic function, which identifies the most promising route. It generates an estimate of how far away the agent is from the goal using the agent's current condition as input.

What sort of heuristic algorithm is that?

By providing quick answers, heuristic algorithms are utilized to solve NP-hard problems and reduce the time complexity of issues. It is frequently used to solve artificial intelligence issues. One illustration is informed search, when more data is available to determine the following step in locating the answer.

To learn more about heuristic algorithm visit:

brainly.com/question/3064392

#SPJ1

Which BEST describes a third-generation computer? A. the CPU was used for the first time, computers could be owned by the general public, and a GUI was used B. used operating systems, keyboards, and monitors for the first time, and integrated circuits were used to supply electricity C. used artificial intelligence so that the computers become reasonably intelligent all on their own D. high-level programming languages, magnetic tape and disks for storage, and used small transistors to supply electricity

Answers

THIRD - GENERATION COMPUTER

C. used artificial intelligence so that the computers become reasonably intelligent all on their own

Third-generation computers were developed in the 1960s and marked a significant advancement in the development of computers. They were the first computers to use integrated circuits, which allowed for smaller and more powerful computers. Third-generation computers also featured the development of high-level programming languages, such as COBOL and FORTRAN, which made it easier for programmers to write and understand code. These computers also used magnetic tape and disks for storage, which were much more efficient than the punched cards used in earlier computers. Third-generation computers made use of artificial intelligence, which allowed them to perform tasks that required some level of independent thought and decision-making.

Hope This Helps You!

A technician has installed two new drives in one of the computers in the computer lab. Disk1 will be utilized for user and application data. Disk 2 has already been properly configured and has production data on in. The technician has been unable to format the appropriate disk from the command prompt.
The lab requires that Disk1 be a dynamic disk configured with two partitions. The first partition must be 256,000 MB in size and mapped to drive F. The second partition must be 512,000 MB in size and mapped to drive G.
The new partitions must be formatted to ensure that user's files can be secured from other users and that the disk must be configured to account for future redundancy.
Make sure to maintain a consistent file system.
INSTRUCTIONS:
Conduct the necessary steps within the Disk Manager to accomplish these tasks.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Answers

A user has installed two new drives in one of the computers in the computer lab and has been unable to format Disk1 from the command prompt.

How to installed new drives in computers?Right click on disk 1, click on initializeChoose disk and option as MBR. Hit ok.Again, right click on disk 1 and choose convert to dynamic disk.Now right click on disk 1 and choose new simple volume.Specify storage as 256000 and assign a drive letter F and choose file system as NTFS and click finish.Do the same thing for rest of space of disk 1, assigning 512000MB and using Disc GA user has installed two new drives in one of the computers in the computer lab and has been unable to format Disk1 from the command prompt.The lab requires that Disk1 be a dynamic disk configured with two partitionsThe first partition must be 256,000 MB in size and mapped to drive F. The second partition must be 512,000 MB in size and mapped to drive G. The new partitions must be formatted to ensure that user â €™s files can be secured from other users and that the disk must be configured to account for future redundancy.Make sure to maintain a consistent file system.

To learn more about installed drives refers to;

https://brainly.com/question/14374281

#SPJ4

Which icon allows you to see paragraph formatting features?

bullets
shading
show/hide
alignment

Answers

An icon that allows you to see paragraph formatting features is known as alignment. Thus, the correct option for this question is D.

What is Paragraph formatting?

Paragraph formatting refers to formatting commands that significantly affect entire paragraph settings such as indenting, bullets, line spacing, and paragraph spacing.

There are four types of paragraph alignment available in Microsoft Word. They typically include left-aligned, center-aligned, right-aligned, and justified.

The paragraph formatting is located on the Home tab or on the Page Layout tab, click the Paragraph Dialog Box Launcher in the Paragraph group.

Therefore, an icon that allows you to see paragraph formatting features is known as alignment. Thus, the correct option for this question is D.

To learn more about Paragraph formatting, refer to the link:

https://brainly.com/question/29327739

#SPJ1

You need to implement HomeGroup on three computers. Which version or versions of Windows could you install that will support this feature?

Answers

Windows 10, Windows 8.1, Windows RT 8.1, and Windows 7 all support HomeGroup. You can join a homegroup but not create one or share content with it on a PC running Windows RT 8.1.

Does HomeGroup still exist in Windows 10?

HomeGroup is no longer available in Windows 10. (Version 1803).  Windows 10 still provides features that let you share printers and data despite its disappearance.

The HomeGroup functionality was first offered by which operating system?

The new HomeGroup feature in Windows 7 makes it simple to connect the PCs in your home. Windows 7-powered computers automatically recognize one another.

To know more about homegroup visit:-

https://brainly.com/question/4042485

#SPJ4

An application named APP1 runs on a domain-joined Windows server named SERVER1. When APP1 runs, it reads and writes to a specific registry key. You need to harden APP1's access to the registry. What should you do

Answers

Make a service account for APP1 and use regedit.exe to provide the service account the required registry rights.

In regedit, how can I add permissions?

Click Start > Run > type regedit.exe > press Enter to launch the Registry Editor. Right-click the key that requires permission in the left pane, then select Permissions. Choose the user or group to which the permission should be applied. For the access levels of the group or username, select the Allow checkbox.

Registry permissions: What are they?

Each permission option allows you to manage Registry rights for a certain person or group. Three groups of these permissions are provided by the Registry. The procedure of defining user access to the Registry keys is made simpler by these groupings.

To know more about APP1 visit:-

https://brainly.com/question/30137229

#SPJ4

disadvantages of network

Answers

wifi works with all of the apps and does online classes

When looking over a written document, you should reread for meaning, add, rearrange, remove and replace. What process are you using

Answers

The revision process includes three rounds of editing: the structure edit, the copy edit, and proofreading. The structural edit is performed at the paragraph level and concentrates on the logic and thought flow.

Is editing or revision done first?

It's time to move on to editing your work when you've done rewriting it. Editing involves changing the way sentences are put together and how they are phrased, but rewriting entails making significant, comprehensive changes to your paper's overall structure and arrangement.

What happens during a document revision?

In order to ensure that the document fulfills its objective, revision entails examining the global level and paragraph level organization of the draft and making modifications at the global, paragraph, and sentence levels.

To know more about editing visit:-

https://brainly.com/question/21263685

#SPJ4

R Management 4. Assume that your system has one queue for jobs waiting for printing, and another queue for those waiting for access to a disk. Which queue would you expect to have the faster response? Explain your reasoning. ​

Answers

This suggests that the other queue, where jobs are awaiting access to a disk, will move more quickly.

Why is a system referred to as a computer?

Its interconnected components (input, output, storage, and CPU) work together to accomplish the tasks specified in the program being run, a computer is referred to as a system.

This is so that other jobs can't interfere with the job that is done as even the printing queue operates on the first Attend, First Wait algorithm, which requires the queue waiting and printing services to go through numerous other procedures before the service provided to print. Additionally, since the job with printing must save the data on the disk, there is a chance that doing so will quickly and randomly alter the disk's content. This may lead to the potential that perhaps the disk is just not updated with the most recent information; as a result, the printing process may produce outdated information that is unusable. However. As it does not operate according to the initial Ask, first Serve algorithm, the queue waiting for disk access would've been able to handle more jobs quickly.

To know more about System visit :

https://brainly.com/question/30146762

#SPJ4

You are asked to recommend an email retrieval protocol for a company's sales team. The sales team needs to access email from various locations and possibly different computers. The sales team does not want to worry about transferring email messages or files back and forth between these computers. Which email protocol is designed for this purpose

Answers

With IMAP4, a mail server can store messages that users can access from different locations and client devices. A POP3 server necessitates the user downloading their email.

Which of the following protocols allows for safe email retrieval?

Email on a remote web server can be accessed from a local client using the Internet Message Access Protocol (IMAP), a mail protocol. The two most often used Internet mail protocols for obtaining emails are IMAP and POP3.

What one of the following protocols do email servers communicate with one another using?

Over the Internet, emails are delivered using the Simple Mail Transfer Protocol (SMTP). Most email clients send messages to the server using this protocol.

To know more about IMAP4 visit :-

https://brainly.com/question/14289109

#SPJ4

A significant part of your marketing plan should allocate resources to online advertising.

True


False

Answers

The statement "a significant part of your marketing plan should allocate resources to online advertising" is definitely true.

What is Online advertising?

Online advertising may be defined as a type of marketing strategy that significantly involves the utilization of the Internet as a medium in order to obtain website traffic and target.

The process of online advertising may typically include banner ads, search engine results pages, social networking ads, email spam, online classified ads, pop-ups, contextual ads, and spyware.

The purpose of a marketing strategy is to maximize the influence of advertising either via online medium or offline versions. The basic intention of this is to promote the marketing of the product to their customers.

Therefore, the statement "a significant part of your marketing plan should allocate resources to online advertising" is definitely true.

To learn more about the Purpose of advertising, refer to the link:

https://brainly.com/question/1658517

#SPJ1

effective when sending a single message to several recipients and when needing to communicate 24 hours a day, 365 days a year.

Answers

Email, is effective when sending a single message to several recipients and when needing tocommunicate 24 hours a day, 365 days a year. Correct answer: letter C.

This means that recipients can receive emails at any time, which is especially beneficial for people in different time zones.

Email is a great tool for mass communication. It allows for a message to be sent to a large number of people with minimal effort.

Email is also easy to use, and most people are familiar with the basics of creating and sending emails. Additionally, messages that are sent via email can be easily tracked, giving the sender the ability to know when a message is received, opened, and responded to.

_____ is effective when sending a single message to several recipients and when needing tocommunicate 24 hours a day, 365 days a year?

A) A weblog

B) A wiki

C) Email

D) Malware

Learn more about The Email:

https://brainly.com/question/24688558

#SPJ4

An isolated equipment grounding receptacle is installed using a rigid nonmetallic conduit and a metal device box. Two 12 AWG conductors enter the box and are spliced to two 12 AWG conductors leaving the box and to two pigtails, which feed the receptacle. The 12 AWG isolated equipment ground has a pigtail splice for the receptacle and continues through the box. A bare 12 AWG equipment grounding conductor enters the box, connects to the box grounding screw, and continues on through the box. Determine the minimum size metal device box for this installation.

Answers

The minimum size metal device box for this installation 3 x 2 x 3 1/2 device box.

What amount of cubic inches of room is needed to instal one no. 12 AWG conductor in a box or conduit fitting?A 2.25 cubic inch, each conductor with a gauge of 12 AWG needs 2.25 cubic inches of space. Both the two white and the two black 12 AWG wires must be counted. The two green equipment-grounding conductors are treated as a single 12 AWG conductor in accordance with 314.16(B)(5).Both the equipment grounding conductor and the grounded circuit conductor must be extended to the second building.Box-fill estimates do not take into account minor fittings like bushings, wire connections, and locknuts. A single count is required for each conductor with an outside-the-box origin that is terminated or spliced inside the box.

To learn more about 12 AWG conductor refer to:

https://brainly.com/question/6531988

#SPJ4

A backup utility can write copies of important data files and folders on ____.
a. an internal hard disk drive
b. an Internet server’s disk drive
c. a network server’s disk drive
d. any of these

Answers

An internal hard drive, a network server's disk drive, or any of the following are all places where a backup program can store copies of crucial data files and folders.

is a short-range wireless technology that enables users to text or make calls using their hands-free?

In order to exchange data between stationary and mobile devices over short distances and to create personal area networks, Bluetooth is a short-range wireless technology standard (PANs).

What do we term a set of various application software packages that are offered as a unit?

When a set of connected software programs (such a collection of graphics programs, utility programs, or office-related software) is offered as a package, that group of software is referred to as a software suite.

To know more about backup program  visit :-

https://brainly.com/question/23653581

#SPJ4

What specific term does the U. S. Department of Justice use to label all illegal access to computer or network systems

Answers

A computer cracker is someone who tries to access computer systems without authority, according to the Glossary. These people, as opposed to hackers, are frequently evil.

What does NBTscan's NBT portion stand for?

TCP/IP over NetBIOS. When working with Windows NT, 2000, and Windows XP computers, the what enumeration tool is quite helpful.

What does the command Nbtstat accomplish?

The NetBIOS over TCP (NBT) connection for the Node is described in detail by the nbtstat command. The IP addresses for the interfaces, the broadcast IP mask, the IP addresses of the active WINS servers, and details about the node's registered NetBIOS identities are also displayed.

To know more about NetBIOS visit:-

https://brainly.com/question/15085605

#SPJ4

Which of the following warns that the computer is infected and needs immediate attention? a. compression tool b. anti-virus software c. FBI consumer alert b. web filter

Answers

Anti-virus software typically warns that the computer is infected and needs immediate attention. Anti-virus software is designed to identify and protect against viruses and other malware that can damage or compromise the security of a computer. If the anti-virus software detects a virus or other threat, it may issue a warning to the user to alert them to the issue and recommend steps to take to address it.

True or false: Sports teams are superior to other forms of entertainment, and do. Do not directly compete with others such as video games and movie theaters

Answers

Because concessions have grown to comprise a significant portion of professional sports teams' overall profits, they have been steadily rising prices in a monopolistic environment, which is why the cost of food and drink in sports stadiums is so high.

Do you mean food by concession?

Some gatherings or locations enter into agreements with third parties to sell food. These agreements are frequently referred to as concessions, which is also the term for a food stand.

What makes food a concession?

A ballpark or other venue's concessions are known as such because the venue has given a certain vendor permission to serve food there. Think about that the next time you're eating peanuts at a sporting event.

To know more about profits visit:-

https://brainly.com/question/15044847

#SPJ4

4.5 code practice phython code answers

Answers

Answer:

count = 0

data = input('Please enter the next word: ')

while data!= "DONE":

         count = count + 1

         print("#" + str(count) +": You entered the word " + data)

         data = input("Please enter the next word: ")

print("A total of "+ str(count) + " words were entered.")

Explanation:

So the code is asking us to put in words from the user and then it will count those words in total.

so first we want the code to start from 0 to get an accurate count

count = 0

boom, first line.

second you will ask the user to input a word with a data string on it to then have it stored

data = input('Please enter the next word: ')

now if the user enters DONE the code will know to stop and give the total

while data != "DONE":

then we will have the code count the words we inputed,

count = count + 1

next we want to know how many words we put in "the whole point of the code.

print("#" + str(count) +": You entered the word " + data)

the data is very important

if the user didnt enter DONE we want the code to continue so we ask the user to enter another word    

  data = input("Please enter the next word: ")

now we do the same thing as the code before, now we show how many words were entered in total

print("A total of "+ str(count) + " words were entered.")

Stay blessed

Stay up

Which of the following devices is used for connecting multiple network hosts where the physical signal is always repeated to all ports?
A. Bridge
B. Router
C. Hub
D. Switch

Answers

The physical signal is always repeated to all ports on hub devices, which are used to connect numerous network hosts.

Which of the following gadgets doesn't pass broadcast data?

Any broadcast packets that are received by a hub, switch, or all other segments in the broadcast domain will be forwarded by those devices, but not by a router.

What network device can be used to link several devices and does not block broadcast traffic?

A hub is a basic type of Layer 1 Ethernet repeater that enables the connection of numerous devices to the same Ethernet network. All ports on a network hub get the same traffic since, unlike a switch, a hub DOES NOT split up collision domains.

To know more about hub visit :-

https://brainly.com/question/14332796

#SPJ4

when choosing a programming language , whihc orf the following will not be deteremined by the choice of language

Answers

The language used should not determine if a solution is present or not.

What elements are important to take into account when selecting a programming language?

The ecology, community, and availability of programmers should all be taken into account when deciding which programming languages to use. Many developers make the error of selecting programming languages simply because they are more well-liked, fashionable, and cool.

Which five steps make up the programming process?

Application program development is the process of making programs. The process that includes the five stages of program development—analyzing, designing, coding, debugging and testing, and implementing and managing application software—is known as the program development life cycle (PDLC).

To know more about language visit :-

https://brainly.com/question/28266804

#SPJ4

Fred has saved a large number of Word documents on his computer running Windows 7 Home Edition. He installs Windows 10 on his computer, using the same partition on which Windows 7 was installed. He does not reformat this partition. What happens to these documents

Answers

These documents are placed in the Windows.old\Documents and Settings\Fred\My Documents folder.

Which Windows 10 installations demand that you submit a product key before they may be installed?

You will require a product key to do a clean install of Windows 10 on a computer when you are utilizing bootable installation media that has never been upgraded to the operating system and activated. Windows 10, as well as a compatible edition of Windows 7, Windows 8, or Windows 9, can be used to enter a product key. 1

Which approach from the list below is used to install Windows 10 completely from scratch on a new computer?

Migration via wiping and loading The user data and settings must be backed up to an external place before you may install Windows 10 on an already-existing PC using this approach. The user data and settings need to be restored after that.

To know more about Windows visit

brainly.com/question/13502522

#SPJ4

You need a fast, secure, and reliable multihomed network perimeter solution that is designed to prevent specific types of network traffic from entering your corporate network. Which solution should you deploy

Answers

Using a ( VPN) virtual private network is the best approach to grant users access to private resources via the internet since encryption of all data assures a secure connection between the client and server.

What network security protocol enables the use of a single setup to encrypt all network traffic?

Contrary to application security protocols like HTTPS, which are only applicable to web servers and require a PKI certificate for each server, IPSec can be configured to secure some or all network traffic with a single setup.

Which of the following has the greatest chance of preventing buffer overflow attacks?

By making sure you are up to current with system and application fixes, buffer overflow threats can frequently be reduced.

To know more about VPN visit:-

https://brainly.com/question/29733551

#SPJ4

A student is creating an algorithm to display the distance between the numbers num1 and num2 on a number line. The following table shows the distance for several different values.
Value of num1 - Value of num2 - Distance Between num1 and num2
5 2 3
1 8 7
-3 4 7
Which of the following algorithms displays the correct distance for all possible values of num1 and num2?

Answers

Subtract number one from number two and store the outcome in the variable diff. Display the outcome by taking the actual value of the difference.

What kind of algorithm would that be?

The process with doing laundry, the way we solve the difficult math problem, the ingredients for making a cake, and the operation of a web search are all instances of algorithms.

What is an algorithm's straightforward definition?

This algorithm is a technique used to carry out a computation or solve a problem. In either hardware-based or software-based routines, algorithms function as a detailed sequence of commands that carry out predetermined operations sequentially. All aspects of project science employ algorithms extensively.

To know more about Algorithm visit :

https://brainly.com/question/22984934

#SPJ4

Give a complete implementation of the stack ADT using a singly linked list that includes a header sentinel.

Answers

Implementing a push operation on a stack using a linked list needs the following steps: Prior to allocating memory, create a node. The node gets pushed to the top of the linked list as the first node if the list is empty.

How is a stack ADT put into practice?

The use of an array, structure, pointer, or linked list can be used to implement a stack. A stack may have a sense of dynamic resizing or it may have a fixed size.

Implementing ADT: What is it?

Instead of storing data in each node, the Stack ADT Implementation stores a pointer to the data. The software allots memory for the data after giving the stack ADT the address.

To know more about ADT visit:-

https://brainly.com/question/15735229

#SPJ4

Select the type of form control that "disguises" the characters that are typed.
a. text box
b. password box
c. encrypt box
d. hidden box

Answers

the style of frame element that hides the characters you type.the password box

What are form controls also known as?

The line of interaction between the client and the server is an interface control called a form control.By control type, interactions change:buttons: button menus: choose, file handling: input type="file," etc.and are additionally categorized.

Basic form control is what?

The majority of form widget kinds, such as single sentence text fields, time & date controls, control mechanisms without input like checkboxes, buttons, and colour pickers, buttons, and so forth, are created using this tool.

To know more about password box visit:

https://brainly.com/question/13987996

#SPJ4

The Query Editor of the Management Studio lets you enter and execute all types of
A) SELECT statements
B) DDL statements
C) DML statements
D) SQL statements

Answers

All DDL statements are inputtable and executable in the Management Studio's Query Editor.

What key is needed to run a query in the query Editor?

Pressing CTRL+L when creating a query will execute the selected text or all of the statements in the Query Editor window, displaying the execution plan.

In Microsoft SQL Server Management Studio, how do you open the query editor?

Select New Query from the context menu by selecting the server node that is currently associated with a Database Engine instance. In addition to connecting to the same instance of the Database Engine, this will open a Database Engine Query Editor window and set the window's database context to the login's default database.

To know more about DDL statements visit :-

https://brainly.com/question/29834976

#SPJ4

Which framework should be recommended for establishing a comprehensive information security management system in an organization?

Answers

The best framework for establishing a comprehensive information security management system in an organization is the ISO 27001 standard.

Implementing an ISO 27001 Standard ISMS for Comprehensive Information Security Management

This framework provides a set of guidelines, processes, and best practices for how to develop, implement, and manage an effective information security management system (ISMS). It helps organizations identify, assess, and manage their information security risks, as well as set up appropriate security controls to protect their data. Additionally, it is the most widely adopted information security standard in the world.

Learn more about Security Management: https://brainly.com/question/14364696

#SPJ4

in a data dictionary, any name other than the standard data element name is called a(n) _____.

Answers

In a data dictionary, any name other than the standard data element name is called an alias.

According to the IBM Dictionary of Computing, a data dictionary is a a feature that keeps track of your data. MAPS contains the Data Dictionary's storage. It is described by Oracle as a group of tables with metadata. The phrase can refer to databases and database management systems (DBMS) in a number of ways that are all closely related.

In order to help users comprehend the tables and data they are working with more quickly and to bring uniformity to your reports and Data Blocks, aliases are field-level descriptive names.

Learn more about data dictionary

brainly.com/question/8897251

#SPJ4

Write a program that:

Takes the list lotsOfNumbers and uses a loop to find the sum of all of the odd numbers in the list (hint: use Mod).
Displays the sum.
Situation B
Write a procedure that takes a positive integer as a parameter. If the number given to the procedure is no more than 30, the procedure should return the absolute difference between that number and 30. If the number is greater than 30, the procedure should return the number doubled.

Answers

Situation A:

#include <iostream>

#include <vector>

#include <string>

int main(int argc, char* argv[]) {

 //Fill it by own.

 std::vector<int> lotsOfNumbers = {0,1,2,3,4,5,6,7,8,9};

 //Loop to find odd numbers.

 for(int i=0;i<lotsOfNumbers.size(); i++) {

   if(lotsOfNumbers[i]%2!=0) std::cout << lotsOfNumbers[i] << std::endl;

   else continue;

 }

 return 0;

}

Situation B:

#include <iostream>

#define check(x) ((x>30) ? 2*x : 30-x)

int main(int argc, char* argv[]) {

 std::cout << check(15) << std::endl;

 std::cout << check(-2) << std::endl;

 std::cout << check(30) << std::endl;

 std::cout << check(78) << std::endl;

 

 return 0;

}

Other Questions
what is thought to be the closest thing we have to a magic bullet against heart disease? 8) A rectangle is 9 feet long and has a perimeter of 32 feet. What is the width of therectangle? Show your work. According to the Katznelson text, the primary check on the interest group advantages of business interests is In The Inferno, Canto 24, Dante and Virgil have to climb the ruins of a bridge and the work is difficult, leaving Dante exhausted. What, according to Virgil, will be lost if Dante gives in to sloth and remains on the ground, recovering from his climb? A customer recently moved a high-end graphics card from a known-working computer to a different computer. The computer works without issue when viewing email and web pages or when using certain applications. However, when a game with high-end graphics requirements is opened, the program will run for a few minutes before the computer shuts down. Which of the following is MOST likely causing the problem?A. Video RAMB. Power supply wattageC. CPU frequencyD. Monitor resolution A 1070-kg car starts from rest at the bottom of a drive way and has a speed of 3.00 m/s at a point where the drive way has risen a vertical height of 0.600 m. Friction and the drive force produced by the engine are the only two nonconservative forces present. Friction does -2870 J of work. How much work does the engine do If $x$ is a positive multiple of 8 and $x^2>100$, but $x Write each trigonometric ratio as a fraction and as a decimal rounded tothe nearest hundredth.3. sin C6. cos C4. tanA7. tan C5. cos A8. sin A What is the rhyme scheme of the first stanza of the poem? Who is responsible for researching and developing the 4 part sexual response cycle discussed in this lecture II. Rewrite the given sentences in their present continuous2. Rahul receives an award on the children's day. Which of the following sentences begins with a dependent clause? A. Of all my friends, Cassandra was the only one who helped me move. B. Because we left for our trip early, the traffic did not stop us from reaching the airport on time. C. During the meeting, James asked several questions about the new policy. D. On the first Tuesday of every month, Jasmine has lunch with her grandparents. what problem exsits with these eurocentric reasons? 19. A pitcher throws a baseball toward a batter at 30m/s. The batter swings hisbat and hits the baseball. The baseball flies away in the opposite direction at aspeed of 35m/s. Is there a transfer of energy in this situation? (SC.7.P.11.4)a) Yes, because both the bat and the ball are moving after the collision.b) No, because the ball and the bat only touched for a short time.c) Yes, because the force from the bat changes the motion of the ball Choose the correct answer:-regarding endometriosis which is false:1. occurring through the pelvic vaginal scares, vagina, bladder, lungs may be involved2. may result from retrograde menstruation 3. more distant foci result from lymphatic or blood born spread 4. retrograde menstruation is always associated with endometriosis combine like terms: Please help will mark Brainly Show that 100 divided by 20 is 5, using at least five daily life examples. The log noted intance of guet ervice and contact. Why i thi important to make a note of? . A window is in the form of a rectangle surmounted by a semicir- cle. The rectangle is of clear glass, whereas the semicircle is of tinted glass that transmits only half as much light per unit area as clear glass does. The total perimeter is fixed. Find the proportions of the window that will admit the most light. Neglect the thick- ness of the frame.